Documente Academic
Documente Profesional
Documente Cultură
ABSTRACT
With the development of science and technology, computers have a large number of applications, electronic files has become
the main way of information storage, and electronic file information security research is a hot issue in the international
community research, for traditional paper document, electronic file management has brought new challenges. To protect the
security of electronic documents in file management study also have very important role. This research was mainly in the
aspect of system protection of electronic documents, analyzed and researched on protection. Therefore, the analysis of the
electronic document protection and study to the security of computer use in China has important significance.
1. INTRODUCTION
With the development of technology, computer is widely applied, and electronic files have become the major
information storage method at present. At the same time, the study on information security of electronic files becomes
the hot issue in social study all around the world. Electric file brings new challenge to traditional paper document
management, so the study on electric file security also plays an important role in the study on file management.
Professional study has been made on the protection of electric file all over the world and drawn attention from many
security institutions and some scholars. The protection of electric file has significance in two aspects of organization
and system. The so-called organization aspect mainly refers to some laws and regulations for protection of electronic
files, as well as the legal punishment for electric file disclosure, while system aspect to the software and hardware for
the protection of electronic files. This study mainly focuses on analysis and study on the protection method and effect
for electronic files in aspect of organization. Therefore, the study on the protection and analysis on electronic files has
significant reference effects on the security of computer use in China.
Page 1
4. CONCLUSIONS
The long-term protection of electronic files is a very hard work by a lot of protection measures, However, the effects of
these methods are limited, while input from multiple fields, including politics, economics, law, culture, and technology
is required to find a more feasible and convenient protective measures by integrating all effective ways. At the same
time, it also requires study and cooperation from multiple subjects and departments to finally form a comprehensive
social atmosphere and technical environment to protect electronic files and realize the protection of electronic files.
ACKNOWLEDGMENTS
National Natural Science Foundation (61373148), National Social Science Fund (12BXW040); Shandong Province
Natural Science Foundation (ZR2012FM038, ZR2011FM030); Shandong Province Outstanding Young Scientist
Award Fund (BS2013DX033), Science Foundation of Ministry of Education of China(14YJC860042).
REFERENCES
[1]
[2]
[3]
[4]
China Science and technology society. Computer and network laws and regulations [M]. Beijing: Law Press, 2000
Feng Huiling. [M]. Beijing: Chinese people's publishing house, 2001
Liu Wei, Wang Zhongxia. Data recovery advanced technology [M], electronic industry press.2006-11.
Chen Xiangqun, Yong.Windows operating system principle of [M]. version second. Mechanical Engineering
Press, 2004
[5] Liu Jiazhen. Overview of long-term access to digital information and information [J]. information journal, 1999
(7).
[6] Zhang Meifang, Guo Lizhu, Zhang Jianhua. The archives protection technology course [M]. Renmin University of
China press, 2000 (8) the first edition
[7] Zhao Dong, Xiao Zhihong. The legal system of security information security in the United States and the reference
[J]. Journal of Chinese People's Public Security University (SOCIAL SCIENCE EDITION), 2007 (5).
Page 2
[8] Ding Mei. The status of electronic file research is compared with the [J]. archives, 2001 (6): 23-24.
[9] Su min, Li Jing. American standard system and strategic analysis of [J]. Chinese standardization, 2006 (9).
[10] Xue Lingyun, Yang Jian. The status quo and development trend of foreign electronic signature law [J].
international trade issues, 2004 (6).
[11] Lu Kaicheng. Data confidentiality and security of a computer cryptography in a computer network (Third Edition).
Tsinghua University press.
[12] Li Xiaoxia. Comparative study on the construction of Chinese and foreign information security law system [J].
China master's degree thesis database, 2006 (6).
[13] Meng Xianyong, Wang Guoxin. Analysis of the development trend of information security technology [J]. office
automation, 2008 (6).
[14] Margaret Hedstom, Ding Huadong, Zhang Bin (translation). The framework of the electronic document research
[J]., 1994 (8).
[15] Li forward. The status quo and development direction of the research on optical disc protection technology [J].
archives and construction, 2006 (1):78-79.
AUTHORS BIOGRAPHY
ZHU Zhenfang , PhD, lecturer, he was born in 1980, Linyi City, Shandong Province. He obtained
Ph.D. in management engineering and industrial engineering at the Shandong Normal University in
2012, his main research fields including the security of network information, network information
filtering, information processing etc.. The authors present the lecturer at the Shandong Jiaotong
University, published more than 30 papers over the year.
Page 3